6 - STREP - 027513 Project full title : Critical Utility InfrastructurAL Resilience

نویسندگان

  • Nuno Neves
  • Paulo Verissimo
  • Anas Abou El Kalam
  • Amine Baina
  • Hakem Beitollahi
  • Alysson Bessani
  • Andrea Bondavalli
  • Miguel Correia
  • Alessandro Daidone
  • Wagner Dantas
  • Geert Deconinck
  • Yves Deswarte
  • Fabrizio Grandoni
  • Henrique Moniz
  • Paulo Sousa
چکیده

This document describes the complete specification of the architecture, services and protocols of the project CRUTIAL. The CRUTIAL Architecture intends to reply to a grand challenge of computer science and control engineering: how to achieve resilience of critical information infrastructures (CII), in particular in the electrical sector. In general lines, the document starts by presenting the main architectural options and components of the architecture, with a special emphasis on a protection device called the CRUTIAL Information Switch (CIS). Given the various criticality levels of the equipments that have to be protected, and the cost of using a replicated device, we define a hierarchy of CIS designs incrementally more resilient. The different CIS designs offer various trade offs in terms of capabilities to prevent and tolerate intrusions, both in the device itself and in the information infrastructure. The Middleware Services, APIs and Protocols chapter describes our approach to intrusiontolerant middleware. The CRUTIAL middleware comprises several building blocks that are organized on a set of layers. The Multipoint Network layer is the lowest layer of the middleware, and features an abstraction of basic communication services, such as provided by standard protocols, like IP, IPsec, UDP, TCP and SSL/TLS. The Communication Support layer features three important building blocks: the Randomized Intrusion-Tolerant Services (RITAS), the CIS Communication service and the Fosel service for mitigating DoS attacks. The Activity Support layer comprises the CIS Protection service, and the Access Control and Authorization service. The Access Control and Authorization service is implemented through PolyOrBAC, which defines the rules for information exchange and collaboration between sub-modules of the architecture, corresponding in fact to different facilities of the CII’s organizations. The Monitoring and Failure Detection layer contains a definition of the services devoted to monitoring and failure detection activities. The Runtime Support Services, APIs, and Protocols chapter features as a main component the Proactive-Reactive Recovery service, whose aim is to guarantee perpetual correct execution of any components it protects.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Utility Infrastructural Resilience

The problem of security and dependability, or generically speaking, resilience [1] of Internet-oriented infrastructure systems, such as web server compounds, is reasonably well understood. Although it is not completely mastered (for example, denial of service is still a research subject), it is receiving adequate attention. However, such is not the case with the problem of resilience of critica...

متن کامل

Testbeds for Assessing Critical Scenarios in Power Control Systems

The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergen...

متن کامل

Islamic Project Financing in Pakistan: Current Challenges and Opportunities Ahead

This study is related to an Islamic project financing with a major focus on investigating the role of Islamic finance in financing infrastructural development projects (toll roads, power plants, airports, and plants, as well as natural resource exploitation projects, such as hydroelectric dams, mining projects, oil and gas assets, and paper mills), especially in the context of Pakistan. Infrast...

متن کامل

Title of the Deliverable: Cross-layer Resilience Optimisation in the Ad-hoc Domain Organisation Name of Lead Contractor for This Deliverable: Aalborg University Start Date of Project: 1

Within the HIDENETS project, cross-layer resilience optimisation has been considered in Work Package 3 task 2. This document presents the results of the work in this area, which consists of 2 parts: (1) A general view on cross-layer optimisation is established, which is used to define a general framework. Using this framework, a specific solution for model-based cross-layer optimisation of mess...

متن کامل

Optimization of Time, Cost, and Quality in Critical Chain Method Using Simulated Annealing (RESEARCH NOTE)

In the last decade, theory of constraint application in project management lead to make a new approach for project scheduling and control as a critical chain. In this paper, a multi-objective optimization model for multi-project scheduling on critical chain is investigated. The objectives include time, cost and quality. In order to solve the problem, a Simulated Annealing algorithm is developed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009